Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
vi
Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
Privacy|Terms

© 2026 Coding4Food. Written by devs, for devs.

All news
IT DramaTechnology

Decompiling the White House App: A Security Nightmare Fueled by a Random GitHub Repo

March 29, 20263 min read

A dev decompiled the new White House app and found it loading arbitrary code from a random GitHub Pages account. A masterclass in what NOT to do.

Share this post:
vpn, virtual private network, vpn for laptop, vpn network, nature, cyber security, hacker attack, hacking, internet security, computer service, plant, floor, jacket, smartphone, phone case, website, internet, http, hotspot, prepaid, couch, tablet, best tablet, hair, blond, hands
Nguồn gốc: https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/decompiling-white-house-app-security-nightmare-githubNguồn gốc: https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github
Nguồn gốc: https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/decompiling-white-house-app-security-nightmare-githubNguồn gốc: https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/decompiling-white-house-app-security-nightmare-github
decompile appbảo mật appapp nhà trắngwebview contextgithub pagesmalware
Share this post:

Bình luận

Related posts

crime, internet, cyberspace, criminal, computer, hacker, data crime, traffic, criminal case, security, control, anti virus, phishing, crime, crime, hacker, hacker, hacker, hacker, hacker, security, security, phishing
AI & AutomationTechnology

OpenClaw: The Viral "Self-Hosted ChatGPT" That's Basically Voluntary Malware

OpenClaw is going viral as a privacy-focused AI tool. But a look under the hood reveals 2,000 CVEs and root access. It's a security dumpster fire.

Feb 283 min read
Read more →

So the US government just dropped a shiny new app for the White House. You'd think it boasts Pentagon-level security, right? Well, a curious dev decided to decompile it, and oh boy, the security nightmare that poured out is pure comedy gold. Grab your coffee, let's dive into this majestic f*ck-up.

The Tea: A Government App or a Freshman's Hackathon Project?

Setting aside the political noise, a Redditor ripped the app apart and gave the verdict: it's janky, poorly written, and snoops around for way too much data.

But the absolute jaw-dropper, the one that made r/programming collectively facepalm, is this: This official government app literally loads code from a random personal GitHub Pages site belonging to some dude named lonelycpp.

And it executes this inside a WebView context. For the uninitiated, let me spell out the disaster: If that random GitHub account gets compromised (or if lonelycpp just feels chaotic evil one night), whoever controls that repo can serve arbitrary HTML and JS straight into the devices of everyone using the app. Instead of spinning up a secure cloud vps like normal people, they cheaped out and leeched off a random GitHub Page. Wild.

Reddit Goes Wild: "What the actual f*ck?"

The devs on Reddit are having a field day roasting this masterpiece. The comments basically fall into a few camps:

  • Pure, Unadulterated Shock: "A government app loading code from a random person's GitHub Pages. What the actual f*ck." Some trolls are even pointing out that lonelycpp now has the opportunity to do something really funny.
  • The Sarcastic Gods: One user dryly noted the absurdity of the app's structure: "So what you're saying is I need to read Bloomberg through the White House app."
  • The Malware Equivalency Theory: Many devs aren't buying the "it's just a bad app" excuse. They're calling it straight-up malware posing as a propaganda bulldozer. As one wise dev pointed out: "Insecure software is indistinguishable from malware." It's just a matter of time before it's exploited.
  • The Existential Dread: Why do people even install this? What does it actually do besides eating up battery and spying on you?

The Dev Takeaway: Don't be that guy

Look, folks, this is a prime example of what NOT to do in production, even if you work for the literal President.

Here's the harsh truth for us code monkeys:

  1. Never blindly trust external resources loaded directly into a WebView. If you must load external code, use Subresource Integrity (SRI) or pin that sh*t.
  2. Pay for your own hosting infrastructure. Don't build a massive institutional app and rely on a random person's personal GitHub repo to serve your code. When it breaks, or worse, gets hijacked, your career is cooked.

Alright, back to fixing my own bugs. Stay secure out there!

Source: Reddit - I Decompiled the White House's New App